This article argues that despite improvements since the alleged hacking of the 2016 presidential electoral race, the U.S. elections infrastructure is still vulnerable, and many voting jurisdictions have small information technology departments that may also be responsible for running other city and town infrastructure.

European Union leaders agreed to impose sanctions to strengthen their response to cyber attacks in future elections. Since there is a lot of misuse of voter data by domestic and international actors to sway elections, the leaders of the EU claim that new measures to tackle disinformation and data manipulation are needed.

Cathay Pacific Airways Ltd. and its subsidiary Hong Kong Dragon Airlines Ltd, confirmed that the data of about 9.4 million of their passengers had been accessed without authorization. The company said that the suspicious activity was discovered in March 2018 and an investigation in May 2018 confirmed that certain personal data was stolen.

Although you can’t protect against everything, finding a practical approach to deal with vulnerabilities is important. Different organizations may have difference preferences and approaches on how to deal with vulnerabilities. The author suggests a novel approach, separating them into three different categories (Known, Latent, and Novel), claiming that it can help you stay ahead of attackers.

In 2019, Visa is planning to provide a blockchain-based digital identity solution for financial institutions to securely process cross-border payments for businesses. The B2B connect system uses a Hyperledger Fabric framework (developed with input from the Linux foundation and IBM), to power the identity platform for individual financial institution clients.

Employee negligence is proven to be one of the many information security risks that can affect companies today. Employee related mistakes such as remote workers, social engineering attacks, and shadow IT can all increase risk to an organization.

Facebook reported that they had a massive security breach with at least 50 million of their users affected. The attackers exploited a vulnerability in Facebook’s code running the “View as” feature, by stealing users access tokens and potentially taking over their accounts.

The healthcare industry has been one of the largest targets of attacks, followed by banking and financial services. These companies facing a security crisis today and need a more scalable approach that protects them from cyber attacks. This article explores the suggestion that a zero trust model could be the answer to some of these problems.

A review of government security audits conducted from 2012 to 2017, have found that agencies rushed in computerizing new weapons systems without prioritizing cybersecurity. The findings were released on Tuesday, October 9th, in a report from the Government Accountability Office.

Electrum, one of the first bitcoin wallets, is planning to integrate the Lightning Network. This will provide its users with, cheaper transactions, instant payment confirmations, and the ability to scale up to a billion transactions a day.

Three senators are asking questions about the circumstances surrounding the vulnerability that lead to the disclosure of personal information for over 500,000 Google+ users. One of the biggest questions was why Google delayed disclosing that they had been hacked.